Zoom Calls? Beware! Lazarus Is Targeting Crypto Founders
Kenny Li, co-founder of Manta Network, recently raised alarms about the modus operandi of Lazarus, the North Korean hacking collective, and its use of Zoom. Li reported that he was…
Auto Added by WPeMatico
Kenny Li, co-founder of Manta Network, recently raised alarms about the modus operandi of Lazarus, the North Korean hacking collective, and its use of Zoom. Li reported that he was…
Nick Johnson, a well‑known Ethereum Name Service (ENS) engineer, disclosed a cunning phishing campaign that preyed on weak spots within Google’s backbone, notably a recently patched OAuth flaw. Google’s Guard…
Decentralized exchange Kiloex suffered a $7 million exploit. Security firm Cyvers identified a potential price oracle vulnerability as the cause. Kiloex Calls for Blacklisting of Attacker’s Address Kiloex, a decentralized…
An individual wanted by Interpol, lost $50 million in a kidnapping that involved drugs, fake police officers, and a daring escape in Brazil. Rodrigo Perez was kidnapped on March 24…
UPCX, a decentralized payment network, has temporarily suspended deposits and withdrawals due to unauthorized activity in its management accounts. Unauthorized Transfer of Millions in UPC Tokens UPCX, a decentralized payment…
Fake CAPTCHA pages tricked users into pasting malware-laced commands into Windows Run, launching stealth attacks that silently deployed infostealers undetected. Deceptive CAPTCHA Pages Deploy Stealth Malware Using Windows Run Exploit…
New malware is attacking cryptocurrency users, stealing wallet credentials and financial data by bypassing Chrome’s encryption and monitoring clipboard activity to intercept and redirect transactions. New Malware Targets Crypto Users,…
The hackers behind the Bybit hack have managed to cash out approximately $300 million of the stolen $1.4 billion in digital assets, despite industry efforts to prevent them.The hack has…
Crypto mixers and crosschain bridges help criminals obscure stolen funds, making it harder for investigators to trace illicit transactions.
A stealthy malware campaign is hijacking crypto wallets by embedding malicious code in fake open-source projects on Github, tricking developers into executing hidden payloads. Stealthy Malware on Github Is Hijacking…